Information Technology

Services

Midwestern State University's Information Technology department is located on our Wichita Falls campus, in the Memorial Building. We provide the following services:

Account creation, maintenance, and deletion

Audio/Visual Equipment, Setup, Recordings

Classroom Technology Quotes, Installation, Support

Computer/Printing Lab Management

Course Evaluations

Data Backup, Storage, Reporting and Recovery

Digital Signage

Hard Drive Removal

Hardware Quotes, Installation, Support

Infrastructure

Laptop Updates and Repairs (MSU property)

Login Assistance

Office technology Installation, Moves, Support

Portal Login

Software Vetting,Quotes, Installation, Support

Telecommunications Services

Third Party Application Support

Wired and Wireless Infrastructure

Midwestern State University is becoming MSU Texas! Read about upcoming changes to our website and email here:MSU Texas

Projects

Current Projects

MSU IT Projects List

Project Name

Time Frame

Progress Notes

Banner 8 to Banner 9

Spring 2019

In Progress

TouchNet Single Sign-On

Spring 2019

In Progress

Domain Name Change

Spring 2019

In Progress

ADA IT Compliance

Ongoing

Ongoing

Wepa Printing Services

Ongoing

Ongoing

Information Security Program

Ongoing

Ongoing

Ad Astra

TBD

In Progress

Capital Projects

MSU IT Projects List

Project Name

Time Frame

Progress Notes

Campus Fiber Project

Fall 2018

In Progress

Moffett Library Remodel

Spring 2019

In Progress

Health Sciences Building

Summer 2019

In Progress

IT HEAF

MSU IT Projects List

Project Name

Time Frame

Progress Notes

Computer Lifecycle Replacement

Ongoing

In Progress Summer 2019

Computer Lab Software

Ongoing

In Progress Spring 2019

Classroom Technology

Ongoing

Ongoing

Known Issues

Remote Access Scams

MSU IT wants to make you aware of remote access scams growing in intensity across the broader Internet.

Users affected by this type of scam may see a web browser screen pop up when browsing that warns of technical issues and urgently asks you to call a phone number or allow a technician to remotely access your computer. These notices will often say they are from Microsoft or Windows.

If you are ever asked to call a phone number or provide remote system access by ANY Internet resource you should immediately contact the Information Technology help desk at extension 4278 for guidance.

Users of Midwestern State University information resources should never provide remote access to any outside party without first consulting with MSU IT to validate the request.

** If you are presented with a screen similar to the examples shown above, turn off your computer immediately and call Information Technology at 4278. **

Petya Ransomware attack

MSU IT would like to make all MSUnet users aware of another ransomware attack currently underway. So far, systems in Spain, France, Ukraine, and Russia have been takenhostageand threat intelligence agencies report that it is expected to go world-wide rather quickly. The ransomware, named Petya, purportedly utilizes the Eternal Blue tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.

The ransomware delivered in this attack presents a message like the one shown below to infected users.If you are presented with a message likethe exampleshown above, turn off your computer immediately and call Information Technology at 4278.

To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:

Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.

Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

WannaCry Ransomware attack

MSU IT would like to make all MSUnet users aware of a worldwide ransomware attack currently underway. So far over 45 thousand attacks have been reported by the SANS Internet Storm Center and infections have been seen in 74 different countries. The attacks purportedly utilize tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.

The ransomware delivered in this attack presents a message like the one shown below to infected users.If you are presented with a message likethe exampleshown above, turn off your computer immediately and call Information Technology at 4278.

To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:

Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.

Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

Spora Ransomware

The unfortunate user who is attacked by this ransomware is presented with a ransom screen that is similar to the examples shown below and once a user is presented with one of these messages the damage has already been done. All the data on your computer at this point are most likely irretrievable.

This ransomware goes by the nameSporaand is a professionally coded product that seems to have been developed by an especiallywell preparedteam of Russiancyber criminals.Sporacan sit idle on your system and can detonate the malicious payload even when you are not connected to the Internet.

Sporais delivered in a variety of ways but predominantly by phishing emails that lure a recipient into clicking a dangerous link or opening a malicious attachment.

To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:

Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.

Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

Google Docs phishing incident

Accounts from public email services such as Yahoo, Google, and Outlook.com that have been compromised are being used to send emails similar to the example shown below:If you receive such an email, please forward it to phishingreports@mwsu.edu and then delete it immediately. The “Open in Docs” link leads to a malicious site hosted in the public Google hosting environment. Google has been made aware of this scheme and is working to shut it down.

Supported Hardware and Software

At this time, MSU Information Technology does not work on any hardware not owned by Midwestern State University.

Minimum Supported Hardware

Hardware Supported by MSU IT

Dell Optiplex 390

Dell Latitude Exx10

E6510, E6410, etc.

Mac products

Must support El Capitan or newer

iMac (Late 2012)

Mac Mini (Late 2012)

MacBookAir (Mid 2012)

MacBookPro (Mid 2012)

Supported Software

A list of our currently supported software is available upon request.

Students may access Microsoft Office 365 for free through the Microsoft website at the Office 365 forStudents site.

ITAC

MSU Information Technology Advisory Committee (ITAC)

Vision: To improve the effectiveness and efficiency of MSU information technology services, the committee will work with the Information Technology Department to ensure proper support and strategic alignment of technologies and infrastructure that enhances the quality of MSU’s administrative and academic technologies.

Mission: To evaluate and make recommendations to the Administrative Council on selection and use of software and hardware solutions. To openly discuss issues that relate to both Academics and Administration and to recommend solutions for those issues and recommend a budget for the acquisition of technology.

The committee will provide the IT Department with recommendations on strategic direction and project priorities that support technologies aligned with administrative and academic needs.